General

  • Target

    1076-59-0x0000000000090000-0x00000000000B8000-memory.dmp

  • Size

    160KB

  • MD5

    caff15f41f88ba799ffbee2a5fc5a408

  • SHA1

    437c9d8103a4a8eccf8210eb29435a04357ffcac

  • SHA256

    d82953a7385642ff83baff5e557c7b4b7d851c9b3cb696d909cdb6219a8d3260

  • SHA512

    a26f5d53334ff262755f236559b280a05fb873ad4e9118c8d69db172e16ab779acd35ffc04a5d5667a0a79a4ebd4d383dcb3da9ca47b9547e63b3c58d0dcf938

  • SSDEEP

    3072:RYO/ZMTFgfCR2RAYQDOOSKkAWoxKqVZDFdyfXmhESS:RYMZMBgf2YtdAWoxK4e/mh

Score
10/10

Malware Config

Extracted

Family

redline

Botnet

@crxnix

C2

193.106.191.160:8673

Attributes
  • auth_value

    4334b1b6304e7a30dd9472e85aa443c9

Signatures

  • RedLine payload 1 IoCs
  • Redline family

Files

  • 1076-59-0x0000000000090000-0x00000000000B8000-memory.dmp
    .exe windows x86


    Headers

    Sections